Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe
-
Size
586KB
-
MD5
b6b60e84ca48c1a8ab2a682bb266d66e
-
SHA1
e227d9daa701cb9548241f2941f030af00599100
-
SHA256
698d2b3fcf5cae47358a08c02375c77b29360bf176e42b1e2f7d77bbb6eb5e58
-
SHA512
4a21ad8a0fe14a5b643171a5b6dd718dbc1421a8ea4fa03d50e073659185fc4cd9c3fa816c2711fd4aa6e5daf0c8a236301e1075bed4a73901358fabaaedce4f
-
SSDEEP
12288:MplrVbDdQaqdS/RfraFE/H8uB2Wm0SXsNr5FU:YxR1+FCcuvm0as
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1704 future.exe -
Loads dropped DLL 2 IoCs
pid Process 1244 2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe 1244 2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\December\future.exe 2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1244 2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe 1244 2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe 1244 2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe 1244 2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe 1704 future.exe 1704 future.exe 1704 future.exe 1704 future.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1704 1244 2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe 28 PID 1244 wrote to memory of 1704 1244 2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe 28 PID 1244 wrote to memory of 1704 1244 2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe 28 PID 1244 wrote to memory of 1704 1244 2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-15_b6b60e84ca48c1a8ab2a682bb266d66e_icedid.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files\December\future.exe"C:\Program Files\December\future.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
586KB
MD5eb9e153ae158a591ae4b52f6b8aaf9a8
SHA1bc0ed8cde6e7ea791675b74afa690479d6f0dc63
SHA256b781a3bbac318eb3ecdd5dc5f0282b7cd00db42f405a833bd8cc186afd3ca255
SHA5120249789da4b55ef6fc32725477e49d93f3ba01a4576f5b75ff5d6654ae4fb7622551bc073d79b8e54f1b471b4d972fd78cd4a9c97295ef0bd958c21c91b5b092